CVE-2016-9800

Priority
Low
Description
In BlueZ 5.42, a buffer overflow was observed in "pin_code_reply_dump"
function in "tools/parser/hci.c" source file. The issue exists because
"pin" array is overflowed by supplied parameter due to lack of boundary
checks on size of the buffer from frame "pin_code_reply_cp *cp" parameter.
References
Bugs
Notes
 mdeslaur> as of 2018-01-22, appears unfixed
Package
Source: bluez (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was deferred [2017-08-01])
Ubuntu 14.04 LTS (Trusty Tahr):deferred (2018-01-22)
Ubuntu 16.04 LTS (Xenial Xerus):deferred (2018-01-22)
Ubuntu 17.10 (Artful Aardvark):deferred (2018-01-22)
Ubuntu 18.04 LTS (Bionic Beaver):deferred (2018-01-22)
More Information

Updated: 2018-01-22 21:14:18 UTC (commit 14041)